pruat-aka-internal.paymentsradius.com Open in urlscan Pro
65.38.115.93  Public Scan

Submitted URL: http://pruat-aka-internal.paymentsradius.com/
Effective URL: https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/displayLogin.do
Submission: On August 27 via api from US — Scanned from DE

Summary

This website contacted 3 IPs in 1 countries across 3 domains to perform 9 HTTP transactions. The main IP is 65.38.115.93, located in United States and belongs to SRS-6-Z-7381, US. The main domain is pruat-aka-internal.paymentsradius.com.
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on August 6th 2020. Valid for: 2 years.
This is the only time pruat-aka-internal.paymentsradius.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
3 5 65.38.115.93 7381 (SRS-6-Z-7381)
1 13.32.118.190 16509 (AMAZON-02)
9 3
Domain Requested by
5 pruat-aka-internal.paymentsradius.com 3 redirects pruat-aka-internal.paymentsradius.com
1 d3ua4cgpi6lo9y.cloudfront.net pruat-aka-internal.paymentsradius.com
0 sealserver.trustkeeper.net Failed pruat-aka-internal.paymentsradius.com
9 3

This site contains links to these domains. Also see Links.

Domain
www.highradius.com
Subject Issuer Validity Valid
*.paymentsradius.com
Go Daddy Secure Certificate Authority - G2
2020-08-06 -
2022-11-02
2 years crt.sh
*.cloudfront.net
Amazon
2022-02-01 -
2023-01-31
a year crt.sh

This page contains 1 frames:

Primary Page: https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/displayLogin.do
Frame ID: 27BCA81C30A0A992BABBF9BAB7310E5F
Requests: 9 HTTP requests in this frame

Screenshot

Page Title

HighRadius Payments OnDemand

Page URL History Show full URLs

  1. http://pruat-aka-internal.paymentsradius.com/ HTTP 302
    https://pruat-aka-internal.paymentsradius.com/ HTTP 302
    https://pruat-aka-internal.paymentsradius.com/PaymentsRadius HTTP 302
    https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/ Page URL
  2. https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/displayLogin.do Page URL

Page Statistics

9
Requests

33 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

3
IPs

1
Countries

14 kB
Transfer

10 kB
Size

2
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://pruat-aka-internal.paymentsradius.com/ HTTP 302
    https://pruat-aka-internal.paymentsradius.com/ HTTP 302
    https://pruat-aka-internal.paymentsradius.com/PaymentsRadius HTTP 302
    https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/ Page URL
  2. https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/displayLogin.do Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://pruat-aka-internal.paymentsradius.com/ HTTP 302
  • https://pruat-aka-internal.paymentsradius.com/ HTTP 302
  • https://pruat-aka-internal.paymentsradius.com/PaymentsRadius HTTP 302
  • https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
pruat-aka-internal.paymentsradius.com/PaymentsRadius/
Redirect Chain
  • http://pruat-aka-internal.paymentsradius.com/
  • https://pruat-aka-internal.paymentsradius.com/
  • https://pruat-aka-internal.paymentsradius.com/PaymentsRadius
  • https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/
319 B
740 B
Document
General
Full URL
https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
65.38.115.93 , United States, ASN7381 (SRS-6-Z-7381, US),
Reverse DNS
Software
Apache/2.4.6 (CentOS) /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15768000;includeSubDomains

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.101 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Cache-Control
max-age=0, no-store, no-cache
Connection
close
Content-Language
de-DE
Content-Length
319
Content-Type
text/html;charset=ISO-8859-1
Date
Sat, 27 Aug 2022 12:08:34 GMT
Pragma
no-cache
Server
Apache/2.4.6 (CentOS)
Strict-Transport-Security
max-age=15768000;includeSubDomains

Redirect headers

Cache-Control
max-age=0, no-store, no-cache
Connection
close
Content-Length
0
Date
Sat, 27 Aug 2022 12:08:32 GMT
Location
https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/
Pragma
no-cache
Server
Apache/2.4.6 (CentOS)
Strict-Transport-Security
max-age=15768000;includeSubDomains
Primary Request displayLogin.do
pruat-aka-internal.paymentsradius.com/PaymentsRadius/
9 KB
12 KB
Document
General
Full URL
https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/displayLogin.do
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
65.38.115.93 , United States, ASN7381 (SRS-6-Z-7381, US),
Reverse DNS
Software
Apache/2.4.6 (CentOS) /
Resource Hash
ac0bc929fee573dcd1d013b25e9d7e4990009466350338b8dac799f34cb0e1de
Security Headers
Name Value
Content-Security-Policy img-src https://sealserver.trustwave.com https://d3ua4cgpi6lo9y.cloudfront.net https://pruat.paymentsradius.com http://www.google-analytics.com https://www.paypalobjects.com https://dub.stats.paypal.com https://www.sandbox.paypal.com https://api.paypal.com/ https://c.paypal.com https://www.paypal.com https://developer.paypal.com/ https://b.stats.paypal.com/ https://hnd.stats.paypal.com/; script-src https://d3ua4cgpi6lo9y.cloudfront.net https://pruat.paymentsradius.com https://www.google.com/recaptcha/api.js https://www.gstatic.com/recaptcha/api2/v1529908317173/recaptcha__en.js https://www.gstatic.com http://www.google-analytics.com/analytics.js https://www.paypal.com/ https://www.sandbox.paypal.com https://api.paypal.com https://developer.paypal.com/ https://js.braintreegateway.com/ https://songbirdstag.cardinalcommerce.com/ https://c.paypal.com/da/r/fb.js https://c.paypal.com/da/r/fb.js https://xiecomm.paymetric.com/ https://s2.go-mpulse.net/boomerang/ https://s.go-mpulse.net/boomerang/ https://s.go-mpulse.net/boomerang/KMYPV-GS https://safetechpageencryption.chasepaymentech.com/ https://safetechpageencryptionvar.chasepaymentech.com/ https://code.jquery.com/ https://code.jquery.com/ https://safetechpageencryptionvar.chasepaymentech.com/ https://safetechpageencryption.chasepaymentech.com/ 'unsafe-inline' 'unsafe-eval'; style-src https://d3ua4cgpi6lo9y.cloudfront.net https://pruat.paymentsradius.com https://fonts.googleapis.com https://assets.braintreegateway.com/ 'unsafe-inline'; font-src null 'self'; child-src https://www.google.com/ https://secure-test.worldpay.com/ https://www.paypal.com/ https://www.sandbox.paypal.com https://api.paypal.com https://developer.paypal.com/ https://c.paypal.com/ https://assets.braintreegateway.com/ https://geostag.cardinalcommerce.com/ https://0merchantacsstag.cardinalcommerce.com/ https://0eafstag.cardinalcommerce.com/ https://centinelapistag.cardinalcommerce.com/ https://1eafstag.cardinalcommerce.com/ https://centinelapi.cardinalcommerce.com/ https://0eaf.cardinalcommerce.com/ https://0merchantacss.cardinalcommerce.com/ https://0merchantacs.cardinalcommerce.com/ https://geo.cardinalcommerce.com/ https://1eaf.cardinalcommerce.com/ https://network-turtle2.highradius.com/ https://network-turtle6.highradius.com/ https://network-citi-uat.highradius.com/ https://cacentral1.pcipalstaging.cloud/ 'self';
Strict-Transport-Security max-age=15768000;includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Content-Type
application/x-www-form-urlencoded
Origin
https://pruat-aka-internal.paymentsradius.com
Referer
https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.101 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Cache-Control
max-age=0, no-store, no-cache
Connection
close
Content-Language
de-DE
Content-Security-Policy
img-src https://sealserver.trustwave.com https://d3ua4cgpi6lo9y.cloudfront.net https://pruat.paymentsradius.com http://www.google-analytics.com https://www.paypalobjects.com https://dub.stats.paypal.com https://www.sandbox.paypal.com https://api.paypal.com/ https://c.paypal.com https://www.paypal.com https://developer.paypal.com/ https://b.stats.paypal.com/ https://hnd.stats.paypal.com/; script-src https://d3ua4cgpi6lo9y.cloudfront.net https://pruat.paymentsradius.com https://www.google.com/recaptcha/api.js https://www.gstatic.com/recaptcha/api2/v1529908317173/recaptcha__en.js https://www.gstatic.com http://www.google-analytics.com/analytics.js https://www.paypal.com/ https://www.sandbox.paypal.com https://api.paypal.com https://developer.paypal.com/ https://js.braintreegateway.com/ https://songbirdstag.cardinalcommerce.com/ https://c.paypal.com/da/r/fb.js https://c.paypal.com/da/r/fb.js https://xiecomm.paymetric.com/ https://s2.go-mpulse.net/boomerang/ https://s.go-mpulse.net/boomerang/ https://s.go-mpulse.net/boomerang/KMYPV-GS https://safetechpageencryption.chasepaymentech.com/ https://safetechpageencryptionvar.chasepaymentech.com/ https://code.jquery.com/ https://code.jquery.com/ https://safetechpageencryptionvar.chasepaymentech.com/ https://safetechpageencryption.chasepaymentech.com/ 'unsafe-inline' 'unsafe-eval'; style-src https://d3ua4cgpi6lo9y.cloudfront.net https://pruat.paymentsradius.com https://fonts.googleapis.com https://assets.braintreegateway.com/ 'unsafe-inline'; font-src null 'self'; child-src https://www.google.com/ https://secure-test.worldpay.com/ https://www.paypal.com/ https://www.sandbox.paypal.com https://api.paypal.com https://developer.paypal.com/ https://c.paypal.com/ https://assets.braintreegateway.com/ https://geostag.cardinalcommerce.com/ https://0merchantacsstag.cardinalcommerce.com/ https://0eafstag.cardinalcommerce.com/ https://centinelapistag.cardinalcommerce.com/ https://1eafstag.cardinalcommerce.com/ https://centinelapi.cardinalcommerce.com/ https://0eaf.cardinalcommerce.com/ https://0merchantacss.cardinalcommerce.com/ https://0merchantacs.cardinalcommerce.com/ https://geo.cardinalcommerce.com/ https://1eaf.cardinalcommerce.com/ https://network-turtle2.highradius.com/ https://network-turtle6.highradius.com/ https://network-citi-uat.highradius.com/ https://cacentral1.pcipalstaging.cloud/ 'self';
Content-Type
text/html;charset=UTF-8
Date
Sat, 27 Aug 2022 12:08:36 GMT
P3P
CP='NON DSP COR CUR ADMa OUR BUS PHY ONL COM STA PUR FIN'
Pragma
no-cache
Referrer-Policy
strict-origin-when-cross-origin
Refresh
900;./index.jsp
Server
Apache/2.4.6 (CentOS)
Strict-Transport-Security
max-age=15768000;includeSubDomains
Transfer-Encoding
chunked
X-Content-Type-Options
nosniff
X-Frame-Options
SAMEORIGIN
X-XSS-Protection
1; mode=block
loadanim.gif
d3ua4cgpi6lo9y.cloudfront.net/images/
878 B
1 KB
Image
General
Full URL
https://d3ua4cgpi6lo9y.cloudfront.net/images/loadanim.gif
Requested by
Host: pruat-aka-internal.paymentsradius.com
URL: https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/displayLogin.do
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.32.118.190 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-32-118-190.fra60.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
9c497084544600af9cecc4c1972500ed00d25060e3d1b362829a30279a72526d

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://pruat-aka-internal.paymentsradius.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.101 Safari/537.36

Response headers

Date
Sat, 27 Aug 2022 12:08:39 GMT
Via
1.1 8eee0c5143f92bd7600d25e3dc25ce5e.cloudfront.net (CloudFront)
Last-Modified
Thu, 11 Jul 2013 07:21:16 GMT
Server
AmazonS3
X-Amz-Cf-Pop
FRA60-P1
ETag
"f73be5a88f590b62ce862f6947ca714c"
X-Cache
Miss from cloudfront
x-amz-version-id
null
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
image/gif
Content-Length
878
X-Amz-Cf-Id
5i0FVeedExN9IgLnZ4K75a_jr0DMd-qGCU8FLPvhTm7y0A4SB8JwkQ==
theme-triton-all-debug_1.css
pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/extjs6/build/development/theme-triton-6.0.2/resources/
0
0

theme-triton-all-debug_2.css
pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/extjs6/build/development/theme-triton-6.0.2/resources/
0
0

login6.css
pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/css/
0
0

ext-all.js
pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/extjs6/ext/build/
0
0

PMTIndex.js
pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/extjs6/
0
0

seal_image.php
sealserver.trustkeeper.net/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
pruat-aka-internal.paymentsradius.com
URL
https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/extjs6/build/development/theme-triton-6.0.2/resources/theme-triton-all-debug_1.css
Domain
pruat-aka-internal.paymentsradius.com
URL
https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/extjs6/build/development/theme-triton-6.0.2/resources/theme-triton-all-debug_2.css
Domain
pruat-aka-internal.paymentsradius.com
URL
https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/css/login6.css
Domain
pruat-aka-internal.paymentsradius.com
URL
https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/extjs6/ext/build/ext-all.js?b=2022-08-23T03:41:36Z
Domain
pruat-aka-internal.paymentsradius.com
URL
https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/extjs6/PMTIndex.js?b=2022-08-23T03:41:36Z
Domain
sealserver.trustkeeper.net
URL
https://sealserver.trustkeeper.net/seal_image.php?customerId=w6otlmlmFVRI4gUZrnfZ1ytnZidMPV&size=105x54&style=invert

Verdicts & Comments Add Verdict or Comment

16 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| noBack string| randomKey string| pubkey object| dms undefined| loginFormElements undefined| isIE undefined| element function| enableSubmitButton

2 Cookies

Domain/Path Name / Value
pruat-aka-internal.paymentsradius.com/PaymentsRadius/ Name: JSESSIONID
Value: D6A0F9F3FC74F1B0E8821A0564E71D85
pruat-aka-internal.paymentsradius.com/PaymentsRadius Name: JSESSIONID
Value: D6A0F9F3FC74F1B0E8821A0564E71D85

6 Console Messages

Source Level URL
Text
security error URL: https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/displayLogin.do(Line 12)
Message:
Refused to load the stylesheet 'https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/extjs6/build/development/theme-triton-6.0.2/resources/theme-triton-all-debug_1.css' because it violates the following Content Security Policy directive: "style-src https://d3ua4cgpi6lo9y.cloudfront.net https://pruat.paymentsradius.com https://fonts.googleapis.com https://assets.braintreegateway.com/ 'unsafe-inline'". Note that 'style-src-elem' was not explicitly set, so 'style-src' is used as a fallback.
security error URL: https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/displayLogin.do(Line 13)
Message:
Refused to load the stylesheet 'https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/extjs6/build/development/theme-triton-6.0.2/resources/theme-triton-all-debug_2.css' because it violates the following Content Security Policy directive: "style-src https://d3ua4cgpi6lo9y.cloudfront.net https://pruat.paymentsradius.com https://fonts.googleapis.com https://assets.braintreegateway.com/ 'unsafe-inline'". Note that 'style-src-elem' was not explicitly set, so 'style-src' is used as a fallback.
security error URL: https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/displayLogin.do(Line 14)
Message:
Refused to load the stylesheet 'https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/css/login6.css' because it violates the following Content Security Policy directive: "style-src https://d3ua4cgpi6lo9y.cloudfront.net https://pruat.paymentsradius.com https://fonts.googleapis.com https://assets.braintreegateway.com/ 'unsafe-inline'". Note that 'style-src-elem' was not explicitly set, so 'style-src' is used as a fallback.
security error URL: https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/displayLogin.do
Message:
Refused to load the script 'https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/extjs6/ext/build/ext-all.js?b=2022-08-23T03:41:36Z' because it violates the following Content Security Policy directive: "script-src https://d3ua4cgpi6lo9y.cloudfront.net https://pruat.paymentsradius.com https://www.google.com/recaptcha/api.js https://www.gstatic.com/recaptcha/api2/v1529908317173/recaptcha__en.js https://www.gstatic.com http://www.google-analytics.com/analytics.js https://www.paypal.com/ https://www.sandbox.paypal.com https://api.paypal.com https://developer.paypal.com/ https://js.braintreegateway.com/ https://songbirdstag.cardinalcommerce.com/ https://c.paypal.com/da/r/fb.js https://c.paypal.com/da/r/fb.js https://xiecomm.paymetric.com/ https://s2.go-mpulse.net/boomerang/ https://s.go-mpulse.net/boomerang/ https://s.go-mpulse.net/boomerang/KMYPV-GS https://safetechpageencryption.chasepaymentech.com/ https://safetechpageencryptionvar.chasepaymentech.com/ https://code.jquery.com/ https://code.jquery.com/ https://safetechpageencryptionvar.chasepaymentech.com/ https://safetechpageencryption.chasepaymentech.com/ 'unsafe-inline' 'unsafe-eval'". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback.
security error URL: https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/displayLogin.do
Message:
Refused to load the script 'https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/static/extjs6/PMTIndex.js?b=2022-08-23T03:41:36Z' because it violates the following Content Security Policy directive: "script-src https://d3ua4cgpi6lo9y.cloudfront.net https://pruat.paymentsradius.com https://www.google.com/recaptcha/api.js https://www.gstatic.com/recaptcha/api2/v1529908317173/recaptcha__en.js https://www.gstatic.com http://www.google-analytics.com/analytics.js https://www.paypal.com/ https://www.sandbox.paypal.com https://api.paypal.com https://developer.paypal.com/ https://js.braintreegateway.com/ https://songbirdstag.cardinalcommerce.com/ https://c.paypal.com/da/r/fb.js https://c.paypal.com/da/r/fb.js https://xiecomm.paymetric.com/ https://s2.go-mpulse.net/boomerang/ https://s.go-mpulse.net/boomerang/ https://s.go-mpulse.net/boomerang/KMYPV-GS https://safetechpageencryption.chasepaymentech.com/ https://safetechpageencryptionvar.chasepaymentech.com/ https://code.jquery.com/ https://code.jquery.com/ https://safetechpageencryptionvar.chasepaymentech.com/ https://safetechpageencryption.chasepaymentech.com/ 'unsafe-inline' 'unsafe-eval'". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback.
security error URL: https://pruat-aka-internal.paymentsradius.com/PaymentsRadius/displayLogin.do(Line 177)
Message:
Refused to load the image 'https://sealserver.trustkeeper.net/seal_image.php?customerId=w6otlmlmFVRI4gUZrnfZ1ytnZidMPV&size=105x54&style=invert' because it violates the following Content Security Policy directive: "img-src https://sealserver.trustwave.com https://d3ua4cgpi6lo9y.cloudfront.net https://pruat.paymentsradius.com http://www.google-analytics.com https://www.paypalobjects.com https://dub.stats.paypal.com https://www.sandbox.paypal.com https://api.paypal.com/ https://c.paypal.com https://www.paypal.com https://developer.paypal.com/ https://b.stats.paypal.com/ https://hnd.stats.paypal.com/".

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=15768000;includeSubDomains